Home
 > Research and Reports > White Papers > Data Loss Prevention Best Practices: Managing Sensiti...

Data Loss Prevention Best Practices: Managing Sensitive Data in the Enterprise

Source: IronPort
While a great deal of attention has been given to protecting companies’ electronic assets from outside threats, organizations must now turn their attention to an equally dangerous situation: data loss from the inside. Given today’s strict regulatory standards, data loss prevention (DLP) has become one of the most critical issues facing executives. Fortunately, effective technical solutions are now available that can help.


Featured publications:

Best Practices for Managing Just-in-time (JIT) Production
Source: Ziff Davis Just-in-time (JIT) manufacturing “is not procrastination, but making a commitment once the scales are tipped in the favor of certainty.” How do you keep your company from falling prey to the “deer-in-the-headlights” syndrome and suffering from decision failures? In this guide, experts share their top seven best practices for deftly managing JIT manufacturing. Read More...
Go Daddy: Best Practices on Validating Storage Performance
Source: Load DynamiX Learn how Go Daddy accelerated new storage technology adoption, decreased risk by ensuring SLAs, and reduced costs by 50% for its 30 PBs of hosting data. The new storage validation process empowers Go Daddy with the insight to optimize both service delivery and vendor selection. Read More...
Customer Analytics in the Age of Social Media
Source: TDWI Read this Best Practices Report from The Data Warehousing Institute (TDWI) on capturing and analyzing social media networking activity - the new frontier for customer intelligence. Read More...


You may also be interested in these related documents:

5 Best Practices for Managing Security on Mobile Devices
Source: Focus Research As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More...
Best Practices for Eliminating Fragmentation With Modern Storage Technologies
Source: Diskeeper Corporation Due to the significant complexity and breadth of the software and hardware used in modern storage environments, there are many myths and misconceptions regarding the continuing need for solutions to fragmentation. Although it is understandably easy to accept many of them as a means for eliminating fragmentation, the fact remains that the disk is the weak link. Find out more. Read More...
Network Data Protection Playbook: Network Security Best Practice for Protecting Your Organization
Source: CipherOptics Malicious hacking and illegal access are just a few of the reasons companies lose precious corporate data every year. As the number of network security breaches increase, companies must find ways to protect data beyond the perimeter of their businesses. But how do they build a data-defensible architecture that will protect data on an ever-evolving network? The answer: by first developing an in-depth defense strategy. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.